Wolf et al., 2014 - Google Patents
Information technology security threats to modern e-enabled aircraft: A cautionary noteWolf et al., 2014
View PDF- Document ID
- 14342151529931896198
- Author
- Wolf M
- Minzlaff M
- Moser M
- Publication year
- Publication venue
- Journal of Aerospace Information Systems
External Links
Snippet
Most passengers, airlines, and the aircraft industry in general are used to very high safety standards and precautions surrounding aircraft systems. As the computerization of aircraft steadily progresses, the question of security (that is, the protection against intentional …
- 238000005516 engineering process 0 title abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wolf et al. | Information technology security threats to modern e-enabled aircraft: A cautionary note | |
Yağdereli et al. | A study on cyber-security of autonomous and unmanned vehicles | |
Ajakwe et al. | Drone transportation system: Systematic review of security dynamics for smart mobility | |
Strohmeier et al. | Securing the air–ground link in aviation | |
Habler et al. | Assessing aircraft security: A comprehensive survey and methodology for evaluation | |
Sampigethaya et al. | Cyber security of unmanned aircraft system traffic management (UTM) | |
Haass et al. | Aviation and cybersecurity: opportunities for applied research | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Mazzolin et al. | A Survey of Contemporary Cyber Security Vulnerabilities and Potential Approaches to Automated Defence | |
Smith et al. | Analyzing privacy breaches in the aircraft communications addressing and reporting system (acars) | |
Ryon et al. | A safety-focused security risk assessment of commercial aircraft avionics | |
Elands et al. | Technical aspects concerning the safe and secure use of drones | |
Constantinides et al. | Security challenges in UAV development | |
Harison et al. | Survey of cyber threats in air traffic control and aircraft communications systems | |
Schmidt | Cyberterrorism: combating the aviation industry's vulnerability to cyberattack | |
Shah et al. | Cybersecurity issues and challenges in civil aviation security | |
Ishtiaq et al. | Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry | |
Haass et al. | A framework for aviation cybersecurity | |
Efe et al. | Air traffic security against cyber threats | |
Kuleshov et al. | Cyber Attacks on Avionics Networks in Digital Twin Environment: Detection and Defense | |
Scott | Aviation Cybersecurity: Regulatory Approach in the European Union | |
Johnson | Civil aviation and cybersecurity | |
Batuwangala et al. | Safety and Security considerations in the certification of next generation avionics and air traffic management systems | |
Limnaios | Cybersecurity Considerations for Aerial Networks | |
Baron Garcia | Machine Learning and Artificial Intelligence Methods for Cybersecurity Data within the Aviation Ecosystem |